Optimized Modelling and Evaluation of Wireless Sensor Networks for Intrusion Detection in Military Applications
DOI:
https://doi.org/10.29304/jqcsm.2024.16.41783Keywords:
Wireless Sensor Networks, Intrusion Detection, Recurrent Convolutional Neural Network, Particle Swarm Optimization, Coral Reef Optimization, Military Surveillance, SecurityAbstract
Wireless sensor networking is a promising technology with a wide range of applications, including health care and defense. The security of Wireless Sensor Networks (WSNs) is a major concern, particularly for applications where confidentiality is of the utmost importance, because, despite their attractive features (e.g., low installation cost, unattended network operation), these networks do not have a physical line of defense. So, to run WSNs securely, it's important to identify breaches before attackers damage the network or the data sink or base station, which are the nodes that collect and store information. Enhancing the intrusion detection system was suggested in this study using a recurrent Convolutional Neural Network (RCNN) optimised using Particle Swarm Optimisation (PSO) and Coral Reef Optimisation (CRO). Successful intrusion detection has been achieved using the suggested method. When combined, PSO and CRO greatly enhance the efficacy and precision of threat identification. Everyone provides a novel and very effective method to resolve the vulnerabilities that endanger critical infrastructure and safeguard WSNs against them.
Downloads
References
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A survey on sensor networks”, IEEE Communications Magazine, vol. 40, num. 8, pp. 102-114, 2002.
E. M. T. A. Alsaadi, S. M. Fayadh, and A. Alabaichi, “A review on security challenges and approaches in the cloud computing,” in AIP Conference Proceedings, 2020, vol. 2290, no. 1.
X. Chen, K. Makki, K. Yen and N. Pissinou, “Sensor network security: A survey”, IEEE Journal of Communications Surveys and Tutorials, vol. 11, num. 2, pp. 52-73, 2009.
Y. Zhou, Y. Fang and Y. Zhang, “Securing wireless sensor networks: a survey”, IEEE Journal of Communications Surveys and Tutorials, vol. 10, num. 3, pp. 6-28, 2008.
Ferng, H.W.; Khoa, N.M. On security of wireless sensor networks: A data authentication protocol usingdigitalsignature.Wirel. Netw.2017,23, 1113–1131. 7.Ismail, B.; In-Ho, R.; Ravi, S. An Intrusion Detection System Based on Multi-Level Clustering for HierarchicalWireless Sensor Networks.Sensors2015,15, 28960–28978.
Li, M.; Lou, W.; Ren, K. Data security and privacy in wireless body area networks.IEEEWirel. Commun.2016,17, 51–58.
Sun, Z.; Xu, Y.; Liang, G.; Zhou, Z. An Intrusion Detection Model for Wireless Sensor Networks with anImproved V-Detector Algorithm.IEEE Sens. J.2018,18, 1971–1984.
Tajbakhsh, A.; Rahmati, M.; Mirzaei, A. Intrusion detection using fuzzy association rules.Appl. Soft. Comput.2009,9, 462–469.
Xie, M.; Hu, J.; Guo, S.; Zomaya, A.Y. Distributed Segment-Based Anomaly Detection with Kullback–LeiblerDivergence in Wireless Sensor Networks.IEEE Trans. Inf. Forensic Secur.2017,12, 101–110.
Xie, M.; Hu, J.; Guo, S. Segment-based anomaly detection with approximated sample covariance matrix inwireless sensor networks.IEEE Trans. Parallel Distrib. Syst.2015,26, 574–583.
Haider, W.; Hu, J.; Slay, J.; Turnbull, B.P.; Xie, Y. Generating realistic intrusion detection system dataset basedon fuzzy qualitative modeling.J. Netw. Comput. Appl.2017,87, 185–192.
Ye, Y.; Li, T.; Adjeroh, D.; Iyengar, S.S. A survey on malware detection using data mining techniques.ACMComput. Surv.2017,50, 41.
Kumar, M.; Hanumanthappa, M. Intrusion detection system using stream data mining and drift detectionmethod.Res. Vet. Sci.2013,93, 168–171.
Khorshidpour, Z.; Hashemi, S.; Hamzeh, A. Evaluation of random forest classifier in security domain.Appl. Intell.2017,47, 558–569.
Lee, S.M.; Kim, D.S.; Park, J.S. A Hybrid Approach for Real-Time Network Intrusion Detection Systems.IEEE Trans. Veh. Technol.2011,60, 457–472.
Singh, K.; Guntuku, S.C.; Thakur, A.; Hota, C. Big Data Analytics framework for Peer-to-Peer Botnet detectionusing Random Forests.Inf. Sci.2014,278, 488–497.
Ronao, C.A.; Cho, S.B. Anomalous query access detection in RBAC-administered databases with randomforest and PCA.Inf. Sci.2016,369, 238–250.
Santos, M.S.; Abreu, P.H.; García-Laencina, P.J.; Simão, A.; Carvalho, A. A new cluster-based oversamplingmethod for improving survival prediction of hepatocellular carcinoma patients.J. Biomed. Inform.2015,58,49–59.
Fayadh, S.M., E.M.T.A. Alsaadi, and H. Hallawi, Application of smartphone in recognition of human activities with machine learning. Indonesian Journal of Electrical Engineering and Computer Science, 2023. 30(2): p. 860-869.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Sabah Mohammed Fayadh
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.